Welcome to the Kids' Library!
Search for books, movies, music, magazines, and more.
Your session will expire automatically in
0
seconds.
Continue session
End session now
Back to Search Results
Limit/Sort Search
SearchType
Keyword
Author
Title
Subject
Call Number
Search
Search Scope
PSU Library Consortium
Pittsburg State University
Academic Libraries
Public Libraries
Pittsburg Area
Unified School District
Leonard H. Axe Library
Career Resource Center Library
Eureka Public Library
Fort Scott Community College Library
George Nettels Elementary School Library
Kansas Technology Center Library
Lakeside Elementary School Library
Meadowlark Elementary School Library
Parsons Public Library
Pittsburg Community Middle School Library
Pittsburg High School Library
Pittsburg Public Library
Sedan Public Library
Westside Elementary School Library
Childrens Collection
Available items only
Add Marked to Bag
Add All On Page
Subjects (1-8 of 8)
Public Key Infrastructure Computer Security
1
ElectronicResource GovDoc
Electronic authentication guideline recommendations of the National Institute of Standards and Techn
Gaithersburg, MD : Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, U.S. Dept. of Commerce, [2011] 2011
Rating:
Website
Copies
Location
Call No.
OPAC Message
Status
Axe Federal Documents Online
C 13.10:800-63-1/2011
---
Available
2
Identity-based encryption
Chatterjee, Sanjit.
New York : Springer, c2011. 2011
Rating:
Copies
Location
Call No.
OPAC Message
Status
Axe 3rd Floor Stacks
005.82 C392i 2011
---
Available
3
Implementing PKI Services on z/OS
[S.l.] : IBM, International Technical Support Organization, c2004. 2004
Rating:
Website
Copies
Location
Call No.
OPAC Message
Status
Axe ProQuest E-Book
Electronic Book
---
Available
4
ElectronicResource GovDoc
Information security status of federal public key infrastructure activities at major federal departm
United States. General Accounting Office.
[Washington, D.C.] : U.S. General Accounting Office, [2003] 2003
Rating:
Website
Copies
Location
Call No.
OPAC Message
Status
Axe Federal Documents Online
GA 1.13:GAO-04-157
---
Available
5
Introduction to identity-based encryption
Martin, Luther.
Boston : Artech House, c2008. 2008
Rating:
Website
Copies
Location
Call No.
OPAC Message
Status
Axe ProQuest E-Book
Electronic Book
---
Available
6
ElectronicResource GovDoc
Introduction to public key technology and the federal PKI infrastructure
Kuhn, D. Richard.
[Gaithersburg, MD] : National Institute of Standards and Technology, [2001] 2001
Rating:
Website
Copies
Location
Call No.
OPAC Message
Status
Axe Federal Documents Online
C 13.10:800-32
---
Available
7
ElectronicResource GovDoc
Public key infrastructure examples of risks and internal control objectives associated with certific
Rhodes, Keith A.
Washington, DC : U.S. Government Accountability Office, [2004] 2004
Rating:
Website
Copies
Location
Call No.
OPAC Message
Status
Axe Federal Documents Online
GA 1.41:GAO-04-1023 R
---
Available
8
ElectronicResource GovDoc
Recommendation for pair-wise key establishment schemes using integer factorization cryptography
[Gaithersburg, Md.] : National Institute of Standards and Technology, [2009] 2009
Rating:
Website
Copies
Location
Call No.
OPAC Message
Status
Axe Federal Documents Online
C 13.10:800-56 B
---
Available
Add Marked to Bag
Add All On Page
Locate in results
Back to Search Results
Limit/Sort Search
Available items only